How should the law respond to Hactivism. By the definition, Hacktivism is merely a specific definition of the more widely used term “ Hacker”. A hactivist is a user who engages in hacker activities for a certain reason or goal: Protesting corporate or political policies. Unlike the well-known term of a hacker, they have a certain goal in mind when hacking a person or an interest on the web. They break into computer systems, frequently with intentions to alter or modify existing settings.
Describe the actions taken to reduce risks to security while using the Internet for different types of business activities. Risks involving security whilst using the internet for business activities Valuable data getting lost (e.g. financial records, customers’ details etc) Hackers gaining access to system and changing or deleting data Infection of systems and data by computer viruses Unfulfilled order (e.g. A customer order their product online, the payment will go through, but the product will not be delivered) Private information being made public by accident Risks and what they do Viruses:- A virus is a software programme which can cause great harm to files or other programs. Trojans:- A Trojan is a network that takes personal information from a home/business co computer and sends it to the internet.
VPN outfits its privacy by way of channeling and security measures. Channeling is a way that packets from one protocol are enclosed inside another protocol. There are a lot of hackers these days sending viruses, malware, and other bugs. It is important for a company to stay protected so that they don’t lose private information or open viruses that could temporarily shut a company down. Remote-access VPNs allows you to securely access corporate resources like servers, computers, and multipurpose printers.
Case Study 2: SCADA Worm Protecting the nation’s critical infrastructure is a major security challenge within the U.S. Likewise, the responsibility for protecting the nation’s critical infrastructure encompasses all sectors of government, including private sector cooperation. Mitigating the vulnerabilities between the private sector and government agencies comes with an effective IT Security Policy Framework which properly implemented can protect us from these attacks. The vulnerabilities, which vary among the products examined, include backdoors, lack of authentication and encryption, and weak password storage that would allow attackers to gain access to the systems (Zetter, 2011). The security weaknesses also make it possible to send malicious commands to the devices in order to crash or halt them, and to interfere with specific critical processes controlled by them, such as the opening and closing of valves.
SECURITY RISKS Hacking: This is when you break into someone’s computer system and gain access to all their files and personal information and also to delete, corrupt or steal their files. There are a lot of hackers on the internet who are highly skilled in computers and know their way around all the firewalls and the computer security system. Hackers usually tend to hack people’s computers with the aim to retrieve things which will benefit them for example bank account details and passwords so they can have access to someone else’s money. Other hackers use it to change the details on someone’s account so they can take their identity which is called identity theft. To avoid getting hacked is to always update your security system on a regular basis so hackers cannot find a way to get through it; also you should install a really secure firewall which should be updated regularly as well.
He can use the names or phone numbers listed in the DNS to gather more sensitive data. Internet Protocol Address range can also be of useful to the attacker. By knowing the IP range, the attacker can port scan and identify active machine on that network. Although IP address range finding is imposable to protect from hackers, there are still counter measures
The ping sweeps and port scans are the two techniques that malicious computer users such as hackers that can use to compromise an Enterprise networks security and gain access to their proprietary data. The ping sweeps are performed to find an open-door into a particular end-point. A person usually can find all kinds of utilities on the internet to exploit the open-doors on the system and gain access to important and confidential files on the network. It is a good idea that we try to protect ourselves against all these types of activities on the network and to also try to conduct them ourselves that way we know that out networks are safe. The ping sweeps are what you really think they are.
The economics of cyber security, externality and liability Cyber security is a best understood if we define the term cyber risk. Cyber risk is not just one specific risk but it is a group of various risks that differ in the technological world, these risks include, attack vectors, means and many others. Cyber security is a measure taken to eliminate cyber risks; it is a branch of information technology sometimes referred as information security that is applied to computers as well as to networks. The systems and networks must be protected, this will guarantee that the future generations of information technology will be able to protect the critical infrastructure and also be able to respond to attacks from the adversaries. Information technology has in the modern days become pervasive in every way.
Use of this technology has created an avenue for industrial espionage, proliferation of malware exploits and numerous other cyber-attacks. Conduct research on this growing technology, include the different scenarios in which it is being used in the workplace, security threats and the mitigating controls that are being used to reduce the risks. Public Key Infrastructure (PKI): The Public Key Infrastructure is a prominent concept in the information technology arena and is based on public/private keys and digital certificates. It operates as an environment in which trust is paramount between users of the infrastructure. In this paper, discuss the core concepts of PKI - authentication, confidentiality, integrity and non-repudiation.
1.2 Also, mails and packages have to be checked for suspicious features. Security procedures have to also be followed when dealing with mails and packages. For example when receiving mail or parcels from strange addresses or suspicious shapes and sizes, security procedures have to be followed , for example checking the packaging to see if there is anything hanging out of the envelope or parcel or if it has been tampered with or opened this must be reported immediately to the director. Emails on the computer can also enclose dangerous information, this could include viruses or various hyperlinks to hack into the businesses systems to capture private information such as bank details or customer contacts, never download any downloads or